lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 22 Dec 2018 14:13:29 +0000 From: bugzilla-daemon@...zilla.kernel.org To: linux-ext4@...r.kernel.org Subject: [Bug 201631] WARNING: CPU: 11 PID: 29593 at fs/ext4/inode.c:3927 .ext4_set_page_dirty+0x70/0xb0 https://bugzilla.kernel.org/show_bug.cgi?id=201631 --- Comment #38 from erhard_f@...lbox.org --- (In reply to Benjamin Herrenschmidt from comment #37) > I would advise against those DMA patches. If the GPU tries to map an sglist > entry that crosses a 1G boundary, bad things will happen. Did not install them, I am running a vanilla kernel. So if they have not been upstreamed they are not in my kernel. ;) -- You are receiving this mail because: You are watching the assignee of the bug.
Powered by blists - more mailing lists